Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2022, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
kp5fi12lDj7RlQU.exe
Resource
win7-20220812-en
General
-
Target
kp5fi12lDj7RlQU.exe
-
Size
935KB
-
MD5
06bacb8b46925876cd0e118fcf8fbe2d
-
SHA1
1c53732662ae7bda1d8575a1e3e621f5345ae201
-
SHA256
552f1eac89b16ae3e92398f85871bfd6e912f9b23526d46d3dac73ae2edd097d
-
SHA512
dfa6ab63d13fdf3a09e1947385ba3119d5cee0c4f1b0162462d43e723852fe0cf81963f6540815271da4ccd299ff5670bb099983a2c30174840b8e2e6943db03
-
SSDEEP
12288:wdV7uikFgEl8kQpaLnyb/WUtTehkj8N/XY58O8Hrexym/PaXCLkR:wlubgEGMcHWXwcekm/PaXakR
Malware Config
Extracted
formbook
4.1
oe29
angelicamedinaconsultora.com
peckish.skin
didjyaknow.biz
rajendra-kulkarni.com
mmdkite.com
solidityconstruction.com
myfertilitypharmacy.com
midniighter.com
iconicresidentialadvisory.co.uk
askpropertiesng.com
internetwifijapan.com
yjiand.com
myadvanceonline.com
couryfeepay.com
sieuthiquocte.com
seapinefunds.com
jshxsj.com
pathfinancialservice.com
jacobjbrunner.com
yn1122.com
valvoi.com
lemonberryskin.com
8228a9.com
checkpolamazon.com
beautifuldogdoors.com
worldplat.info
moringify.com
274711.com
5125738.com
a4dh73d8.com
americafirs.info
bbqneptun.net
joelmabeautyskincare.com
ermisinvestments.com
sa-group3.xyz
hbimgeecc.xyz
theproprietorship.com
p9k.xyz
amjedd.com
brofjoc.online
santoexpeditomaua.com
jr7ei.net
122xiai.com
campbellfam.xyz
timberandice.com
nickcaseymedia.com
whoowstownhall.com
profreformsdk.com
amazonflipkart.com
suzannegeisman.com
svgeditor.store
tzpm045.com
nike-shoes.site
coastalenergymanagement.com
lockerboardz.com
n3gativeoutlook.com
keenstock.com
joyfulmemoriesnaples.com
ethereans.finance
xn--1lqaa574wbab.asia
brickrosedesigns.com
cesica1983.com
aflacdentalplan.com
movingtotulum.com
aleeportfolio.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/968-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/968-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4424-147-0x0000000000B90000-0x0000000000BBF000-memory.dmp formbook behavioral2/memory/4424-150-0x0000000000B90000-0x0000000000BBF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2356 set thread context of 968 2356 kp5fi12lDj7RlQU.exe 99 PID 968 set thread context of 776 968 kp5fi12lDj7RlQU.exe 47 PID 4424 set thread context of 776 4424 mstsc.exe 47 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 968 kp5fi12lDj7RlQU.exe 968 kp5fi12lDj7RlQU.exe 968 kp5fi12lDj7RlQU.exe 968 kp5fi12lDj7RlQU.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe 4424 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 776 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 968 kp5fi12lDj7RlQU.exe 968 kp5fi12lDj7RlQU.exe 968 kp5fi12lDj7RlQU.exe 4424 mstsc.exe 4424 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 968 kp5fi12lDj7RlQU.exe Token: SeDebugPrivilege 4424 mstsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 kp5fi12lDj7RlQU.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2356 kp5fi12lDj7RlQU.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2356 wrote to memory of 968 2356 kp5fi12lDj7RlQU.exe 99 PID 2356 wrote to memory of 968 2356 kp5fi12lDj7RlQU.exe 99 PID 2356 wrote to memory of 968 2356 kp5fi12lDj7RlQU.exe 99 PID 2356 wrote to memory of 968 2356 kp5fi12lDj7RlQU.exe 99 PID 2356 wrote to memory of 968 2356 kp5fi12lDj7RlQU.exe 99 PID 2356 wrote to memory of 968 2356 kp5fi12lDj7RlQU.exe 99 PID 776 wrote to memory of 4424 776 Explorer.EXE 100 PID 776 wrote to memory of 4424 776 Explorer.EXE 100 PID 776 wrote to memory of 4424 776 Explorer.EXE 100 PID 4424 wrote to memory of 1412 4424 mstsc.exe 101 PID 4424 wrote to memory of 1412 4424 mstsc.exe 101 PID 4424 wrote to memory of 1412 4424 mstsc.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\kp5fi12lDj7RlQU.exe"C:\Users\Admin\AppData\Local\Temp\kp5fi12lDj7RlQU.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\kp5fi12lDj7RlQU.exe"C:\Users\Admin\AppData\Local\Temp\kp5fi12lDj7RlQU.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\kp5fi12lDj7RlQU.exe"3⤵PID:1412
-
-